Acquisition and visualization of sensitive security audit events
暂无分享,去创建一个
[1] Hideki Koike,et al. Tudumi: information visualization system for monitoring and auditing computer logs , 2002, Proceedings Sixth International Conference on Information Visualisation.
[2] Adam Carlson,et al. Modeling network intrusion detection alerts for correlation , 2007, ACM Trans. Inf. Syst. Secur..
[3] Dominique Brodbeck,et al. A Visual Approach for Monitoring Logs , 1998, LISA.
[4] Xu Chao,et al. The Implementation of Alert Aggregation and Dataset Testing , 2006 .
[5] Jun Zhang,et al. Detection of Outbreaks from Time Series Data Using Wavelet Transform , 2003, AMIA.
[6] Deborah A. Frincke,et al. A Novel Framework for Alert Correlation and Understanding , 2004, ACNS.
[7] Yinglian Xie,et al. A spatiotemporal event correlation approach to computer security , 2005 .
[8] Risto Vaarandi,et al. SEC - a lightweight event correlation tool , 2002, IEEE Workshop on IP Operations and Management.
[9] Stephen G. Eick,et al. Displaying trace files , 1996 .
[10] Graham J. Wills,et al. Visualizing Network Data , 2009, Encyclopedia of Database Systems.